Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2024-0928

Опубликовано: 26 янв. 2024
Источник: nvd
CVSS3: 4.7
CVSS3: 9.8
CVSS2: 5.8
EPSS Низкий

Описание

A vulnerability was found in Tenda AC10U 15.03.06.49_multi_TDE01. It has been declared as critical. Affected by this vulnerability is the function fromDhcpListClient. The manipulation of the argument page/listN leads to stack-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-252133 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

Ссылки

Уязвимые конфигурации

Конфигурация 1

Одновременно

cpe:2.3:o:tendacn:ac10u_firmware:15.03.06.49_multi_tde01:*:*:*:*:*:*:*
cpe:2.3:h:tendacn:ac10u:1.0:*:*:*:*:*:*:*

EPSS

Процентиль: 39%
0.00172
Низкий

4.7 Medium

CVSS3

9.8 Critical

CVSS3

5.8 Medium

CVSS2

Дефекты

CWE-121

Связанные уязвимости

CVSS3: 4.7
github
около 2 лет назад

A vulnerability was found in Tenda AC10U 15.03.06.49_multi_TDE01. It has been declared as critical. Affected by this vulnerability is the function fromDhcpListClient. The manipulation of the argument page/listN leads to stack-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-252133 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

CVSS3: 4.7
fstec
около 2 лет назад

Уязвимость функции fromDhcpListClient микропрограммного обеспечения маршрутизаторов Tenda AC10U, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации

EPSS

Процентиль: 39%
0.00172
Низкий

4.7 Medium

CVSS3

9.8 Critical

CVSS3

5.8 Medium

CVSS2

Дефекты

CWE-121